← Volver a CVEs
CVE-2012-4540
N/ADescripcion
Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado11/11/2012
Ultima modificacion4/11/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
opensuse:opensuseredhat:icedtea-web
Debilidades (CWE)
CWE-189
Referencias
http://icedtea.classpath.org/hg/release/icedtea-web-1.1/file/d759ec560073/NEWS(secalert@redhat.com)
http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/596a718be03f(secalert@redhat.com)
http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/e7970f3da5fe(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2012-11/msg00040.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00065.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html(secalert@redhat.com)
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-November/020775.html(secalert@redhat.com)
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-September/024750.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2012-1434.html(secalert@redhat.com)
http://secunia.com/advisories/51206(secalert@redhat.com)
http://secunia.com/advisories/51220(secalert@redhat.com)
http://secunia.com/advisories/51374(secalert@redhat.com)
http://security.gentoo.org/glsa/glsa-201406-32.xml(secalert@redhat.com)
http://www.debian.org/security/2013/dsa-2768(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2012:171(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/11/07/5(secalert@redhat.com)
http://www.securityfocus.com/bid/56434(secalert@redhat.com)
http://www.securityfocus.com/bid/62426(secalert@redhat.com)
http://www.securitytracker.com/id?1027738(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1625-1(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1007960(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=869040(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/79894(secalert@redhat.com)
http://icedtea.classpath.org/hg/release/icedtea-web-1.1/file/d759ec560073/NEWS(af854a3a-2127-422b-91ae-364da2661108)
http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/596a718be03f(af854a3a-2127-422b-91ae-364da2661108)
http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/e7970f3da5fe(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2012-11/msg00040.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00065.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html(af854a3a-2127-422b-91ae-364da2661108)
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-November/020775.html(af854a3a-2127-422b-91ae-364da2661108)
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-September/024750.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1434.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51206(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51220(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51374(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-201406-32.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2013/dsa-2768(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2012:171(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/11/07/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/56434(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/62426(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1027738(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1625-1(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1007960(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=869040(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/79894(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.